首页> 外文期刊>Journal of network and computer applications >Detecting node replication attacks in wireless sensor networks: A survey
【24h】

Detecting node replication attacks in wireless sensor networks: A survey

机译:在无线传感器网络中检测节点复制攻击:一项调查

获取原文
获取原文并翻译 | 示例
           

摘要

A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research.
机译:无线传感器网络(WSN)由许多微型,低成本且资源受限的传感器节点组成,但通常部署在无人值守和恶劣的环境中以执行各种监视任务。结果,WSN容易受到许多与应用程序和应用程序无关的攻击。在本文中,我们考虑了后者中的典型威胁,即节点复制攻击,在该威胁中,对手准备了自己的低成本传感器节点,并欺骗网络以使其接受为合法传感器节点。为此,对手只需要物理捕获一个节点,提取其秘密凭据,大量复制该节点,然后在其控制下将副本部署到网络中(可能在战略位置),从而几乎不破坏各种WSN应用程序努力。防御此类节点复制攻击最近已成为传感器网络安全中的当务之急,与检测典型的依赖应用程序的攻击相比,设计问题可能涉及不同且更具威胁性的挑战。在这项调查中,我们对文献中现有的检测进行分类,并探讨每个类别中的各种建议。我们将研究必要的技术细节并进行一定的比较,以证明它们各自的贡献和局限性。我们还提出了技术挑战,并指出了未来研究的一些可能方向。

著录项

  • 来源
    《Journal of network and computer applications》 |2012年第3期|p.1022-1034|共13页
  • 作者单位

    State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, 19A Yuquan Road, Beijing 100049, China;

    Cryptography & Security Department, Institute for Infocomm Research, 1 Fusionopolis Way, Singapore 138632, Singapore;

    School of Information Systems, Singapore Management University, 80 Stamford Road, Singapore 178902, Singapore;

    Cryptography & Security Department, Institute for Infocomm Research, 1 Fusionopolis Way, Singapore 138632, Singapore;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    wireless sensor network; security; node replication attack; detection;

    机译:无线传感器网络;安全;节点复制攻击;检测;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号